Sciweavers

550 search results - page 23 / 110
» Public Key Encryption and Encryption Emulation Attacks
Sort
View
TISSEC
2008
77views more  TISSEC 2008»
13 years 9 months ago
Provably Secure Timed-Release Public Key Encryption
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
AFRICACRYPT
2010
Springer
13 years 8 months ago
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
David Galindo, Benoît Libert, Marc Fischlin,...
SCN
2010
Springer
113views Communications» more  SCN 2010»
13 years 7 months ago
Public-Key Encryption with Efficient Amortized Updates
Nishanth Chandran, Rafail Ostrovsky, William E. Sk...
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 9 months ago
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant of Matsumoto Imai cryptosystem C . However Patarin later found that Little Dragon ...
Rajesh P. Singh, Anupam Saikia, B. K. Sarma